Required Access Sample Clauses

Required Access. In connection with the indemnification obligations of Seller set forth in Section 16.6 of this Agreement, Purchaser shall cooperate with all reasonable requests of Seller to provide timely, appropriate and reasonable access to Seller (or its designees, including any parties necessary for Seller to comply with the terms of any indemnification agreements which are referred to in Sections 1.2(i), 1.2(j) and 1.2(k) and Schedule 1.2) to the Purchaser's property, business records, employees, and data and agrees to enter into mutually acceptable access agreements in connection therewith.
AutoNDA by SimpleDocs
Required Access. Customer shall provide the Required Access and Required Access Rights to Cysiv. Customer agrees and acknowledges that Cysiv will be unable to provide the Services to Customer unless Customer provides the Required Access and Required Access Rights to Cysiv.
Required Access. With respect to any Contractor personnel who no longer require, or is no longer authorized, for whatever reason, access to SWK Data, where access is managed by SWK, Contractor shall notify SWK in writing at least twenty-four (24) hours prior to the date on which such access is no longer required. If such access is removed under exigent circumstances such that twenty-four (24) hours prior notice is not possible, Contractor shall notify SWK immediately upon knowledge that such access is to be removed.

Related to Required Access

  • Restricted Access (a) Buyer agrees that the Facilities themselves contain Seller’s valuable trade secrets. Buyer agrees (i) to restrict the use of such information to matters relating to the Facilities, and (ii) to restrict access to such information as provided in Section 10.3(b). (b) Seller’s Confidential Information will not be reproduced without Seller’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Seller upon written request (not to be made while materials are still of use to the operation of a Facility and no Buyer Default has occurred and is continuing), unless otherwise agreed by the Parties. Buyer’s Confidential Information will not be reproduced by Seller without Buyer’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Buyer upon written request or shall be certified by Seller as having been destroyed. (c) Subject to ARTICLE XI and Section 10.2(a) and (b) hereof, the Facilities are offered for sale and are sold by Seller subject to the condition that such sale does not convey any license, expressly or by implication, to manufacture, reverse engineer, duplicate or otherwise copy or reproduce any part of the Facilities, documentation or Software without Seller’s express advance written permission. Subject to ARTICLE XI hereof, Buyer agrees not to remove the covering, not to access the interior or to reverse engineer, or cause or knowingly allow any third party to open, access the interior or reverse engineer any Facility or Software provided by Seller. Subject to ARTICLE XI hereof, and anything contemplated pursuant to this Agreement, only Seller or its authorized representatives may open or access the interior of a Facility. Notwithstanding the foregoing or anything else herein to the contrary, and without limitation of the rights set forth in ARTICLE XI hereof, if any Facility is no longer covered by this Agreement or another agreement between Buyer and Seller (or any Affiliate of Seller) regarding the operation and maintenance of such Facility, Buyer shall be entitled to maintain, or cause a third party to maintain, such Facility, including replacing parts or components as needed or desired; provided that Buyer shall use commercially reasonable efforts to engage a third party to provide such maintenance that is not a competitor of Seller or its Affiliates and is not in litigation or other material dispute with Seller.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Access Notification XXX shall notify Provider promptly of any known unauthorized access. XXX will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Limited Access If necessary for the fulfillment of the Agreement, NBU may provide the Professional with non-exclusive, limited access to NBU’s information technology infrastructure. The Professional understands and agrees to abide by NBU policies, standards, regulations and restrictions regarding access and usage of NBU’s information technology infrastructure. The Professional shall reasonably enforce such policies, standards, regulations and restrictions with all the Professional’s employees, agents or any tier of subcontractor granted access in the performance of this Agreement, and shall be granted and authorize only such access as may be necessary for the purpose of fulfilling the requirements of the Agreement. The Professional’s employees, agents and subcontractors must receive prior, written approval from NBU before being granted access to NBU’s information technology infrastructure and data and NBU, in its sole determination, shall determine accessibility and limitations thereto. The Professional agrees that the requirements of this Section shall be incorporated into all subcontractor agreements entered into by the Professional. It is further agreed that a violation of this Section shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Agreement without notice.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Facility Access Notwithstanding any other provision of the Agreement, the Customer shall provide the Authority with such access to the Facility, and such documentation, as the Authority deems necessary to determine the Customer’s compliance with the Customer’s Supplemental Commitments specified in this Schedule B.

  • Required Acceptance of Daily Load Deliveries and Notification If the State is harmed by purchaser’s refusal to accept up to 10 truck deliveries of any one sort per day, Purchaser will be in breach of contract and subject to damages as per the D-026.2 and D-027.2 clauses. A truck delivery is all the wood delivered including sorts on super trucks, mule trains and pups brought to the delivery point by a single truck. The Purchaser shall notify the Contract Administrator at least 48 hours in advance if: 1. Purchaser intends to limit the number of truck deliveries accepted on any day to less than that listed above, or 2. Purchaser intends to limit the number of truck deliveries accepted on any day to the number listed above.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Open Access Same-Time Information System (OASIS): 1. 28A Operating Agreement of the PJM Interconnection, L.L.C. or Operating Agreement:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!